Sciweavers

5410 search results - page 35 / 1082
» When to Cross Over
Sort
View
ESORICS
2011
Springer
12 years 8 months ago
Automatic and Precise Client-Side Protection against CSRF Attacks
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...
NECO
2008
69views more  NECO 2008»
13 years 8 months ago
Theory of Input Spike Auto- and Cross-Correlations and Their Effect on the Response of Spiking Neurons
Spike correlations between neurons are ubiquitous in the cortex, but their role is at present not understood. Here we describe the firing response of a leaky integrate-and-fire ne...
Rubén Moreno-Bote, Alfonso Renart, Né...
ISDO
2000
194views Business» more  ISDO 2000»
13 years 10 months ago
Contract-Based Transaction Management in Cross-Organizational Workflow Management
Cross-organizational workflow management is an essential ingredient for process integration in virtual enterprises. To obtain cross-organizational workflow processes with robust s...
Paul W. P. J. Grefen
DSN
2004
IEEE
14 years 11 days ago
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over IP networks. As the popularity of VoIP systems increases, they are bei...
Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Si...
EUC
2006
Springer
14 years 9 days ago
Cross-Layer Duty Cycle Scheduling with Data Aggregation Routing in Wireless Sensor Networks
Abstract. Well-scheduled communications, in conjunction with the aggregation of data reduce the energy waste on idle listening and redundant transmissions. In addition, the adjusta...
Yean-Fu Wen, Frank Yeong-Sung Lin